1
0
mirror of https://github.com/hashcat/hashcat.git synced 2024-11-22 08:08:10 +00:00

minor whitespace fixes, per #2841

This commit is contained in:
Royce Williams 2021-06-21 07:47:22 -08:00
parent 3cd638f624
commit 1e88990b46
31 changed files with 108 additions and 108 deletions

View File

@ -1847,7 +1847,7 @@ DECLSPEC void point_mul_xy (u32 *x1, u32 *y1, const u32 *k, GLOBAL_AS const secp
{ {
u32 naf[SECP256K1_NAF_SIZE] = { 0 }; u32 naf[SECP256K1_NAF_SIZE] = { 0 };
int loop_start = convert_to_window_naf(naf, k); int loop_start = convert_to_window_naf(naf, k);
// first set: // first set:
const u32 multiplier = (naf[loop_start >> 3] >> ((loop_start & 7) << 2)) & 0x0f; // or use u8 ? const u32 multiplier = (naf[loop_start >> 3] >> ((loop_start & 7) << 2)) & 0x0f; // or use u8 ?
@ -1973,7 +1973,7 @@ DECLSPEC void point_mul_xy (u32 *x1, u32 *y1, const u32 *k, GLOBAL_AS const secp
mul_mod (z1, z2, z1); // z1^3 mul_mod (z1, z2, z1); // z1^3
mul_mod (y1, y1, z1); // y1_affine mul_mod (y1, y1, z1); // y1_affine
// return values are already in x1 and y1 // return values are already in x1 and y1
} }

View File

@ -204,7 +204,7 @@ KERNEL_FQ void m03500_sxx (KERN_ATTR_RULES ())
/** /**
* base * base
*/ */
COPY_PW (pws[gid]); COPY_PW (pws[gid]);

View File

@ -1,7 +1,7 @@
/** /**
* Author......: See docs/credits.txt * Author......: See docs/credits.txt
* License.....: MIT * License.....: MIT
*/ */
#define NEW_SIMD_CODE #define NEW_SIMD_CODE

View File

@ -120,7 +120,7 @@ KERNEL_FQ void m14511_mxx (KERN_ATTR_RULES_ESALT (cryptoapi_t))
ctx.w0[0] = 0x41000000; ctx.w0[0] = 0x41000000;
ctx.len = 1; ctx.len = 1;
sha1_update_swap (&ctx, w, w_len); sha1_update_swap (&ctx, w, w_len);
sha1_final (&ctx); sha1_final (&ctx);

View File

@ -255,7 +255,7 @@ KERNEL_FQ void m14512_sxx (KERN_ATTR_RULES_ESALT (cryptoapi_t))
} }
// key // key
u32 ukey[8] = { 0 }; u32 ukey[8] = { 0 };
ukey[0] = hc_swap32_S (k0); ukey[0] = hc_swap32_S (k0);

View File

@ -256,7 +256,7 @@ KERNEL_FQ void m14513_sxx (KERN_ATTR_RULES_ESALT (cryptoapi_t))
} }
// key // key
u32 ukey[8] = { 0 }; u32 ukey[8] = { 0 };
ukey[0] = hc_swap32_S (k0); ukey[0] = hc_swap32_S (k0);

View File

@ -243,7 +243,7 @@ KERNEL_FQ void m14522_sxx (KERN_ATTR_RULES_ESALT (cryptoapi_t))
salt_bufs[SALT_POS].salt_buf[0], salt_bufs[SALT_POS].salt_buf[0],
salt_bufs[SALT_POS].salt_buf[1], salt_bufs[SALT_POS].salt_buf[1],
salt_bufs[SALT_POS].salt_buf[2], salt_bufs[SALT_POS].salt_buf[2],
salt_bufs[SALT_POS].salt_buf[3] salt_bufs[SALT_POS].salt_buf[3]
}; };
// CT // CT

View File

@ -102,7 +102,7 @@ KERNEL_FQ void m14522_mxx (KERN_ATTR_ESALT (cryptoapi_t))
salt_bufs[SALT_POS].salt_buf[0], salt_bufs[SALT_POS].salt_buf[0],
salt_bufs[SALT_POS].salt_buf[1], salt_bufs[SALT_POS].salt_buf[1],
salt_bufs[SALT_POS].salt_buf[2], salt_bufs[SALT_POS].salt_buf[2],
salt_bufs[SALT_POS].salt_buf[3] salt_bufs[SALT_POS].salt_buf[3]
}; };
// CT // CT
@ -233,7 +233,7 @@ KERNEL_FQ void m14522_sxx (KERN_ATTR_ESALT (cryptoapi_t))
salt_bufs[SALT_POS].salt_buf[0], salt_bufs[SALT_POS].salt_buf[0],
salt_bufs[SALT_POS].salt_buf[1], salt_bufs[SALT_POS].salt_buf[1],
salt_bufs[SALT_POS].salt_buf[2], salt_bufs[SALT_POS].salt_buf[2],
salt_bufs[SALT_POS].salt_buf[3] salt_bufs[SALT_POS].salt_buf[3]
}; };
// CT // CT

View File

@ -115,7 +115,7 @@ KERNEL_FQ void m14522_mxx (KERN_ATTR_VECTOR_ESALT (cryptoapi_t))
salt_bufs[SALT_POS].salt_buf[0], salt_bufs[SALT_POS].salt_buf[0],
salt_bufs[SALT_POS].salt_buf[1], salt_bufs[SALT_POS].salt_buf[1],
salt_bufs[SALT_POS].salt_buf[2], salt_bufs[SALT_POS].salt_buf[2],
salt_bufs[SALT_POS].salt_buf[3] salt_bufs[SALT_POS].salt_buf[3]
}; };
// CT // CT
@ -259,7 +259,7 @@ KERNEL_FQ void m14522_sxx (KERN_ATTR_VECTOR_ESALT (cryptoapi_t))
salt_bufs[SALT_POS].salt_buf[0], salt_bufs[SALT_POS].salt_buf[0],
salt_bufs[SALT_POS].salt_buf[1], salt_bufs[SALT_POS].salt_buf[1],
salt_bufs[SALT_POS].salt_buf[2], salt_bufs[SALT_POS].salt_buf[2],
salt_bufs[SALT_POS].salt_buf[3] salt_bufs[SALT_POS].salt_buf[3]
}; };
// CT // CT

View File

@ -80,7 +80,7 @@ KERNEL_FQ void m14523_mxx (KERN_ATTR_RULES_ESALT (cryptoapi_t))
} }
// key // key
u32 ukey[8] = { 0 }; u32 ukey[8] = { 0 };
ukey[0] = hc_swap32_S (k0); ukey[0] = hc_swap32_S (k0);
@ -106,7 +106,7 @@ KERNEL_FQ void m14523_mxx (KERN_ATTR_RULES_ESALT (cryptoapi_t))
salt_bufs[SALT_POS].salt_buf[0], salt_bufs[SALT_POS].salt_buf[0],
salt_bufs[SALT_POS].salt_buf[1], salt_bufs[SALT_POS].salt_buf[1],
salt_bufs[SALT_POS].salt_buf[2], salt_bufs[SALT_POS].salt_buf[2],
salt_bufs[SALT_POS].salt_buf[3] salt_bufs[SALT_POS].salt_buf[3]
}; };
// CT // CT
@ -244,7 +244,7 @@ KERNEL_FQ void m14523_sxx (KERN_ATTR_RULES_ESALT (cryptoapi_t))
salt_bufs[SALT_POS].salt_buf[0], salt_bufs[SALT_POS].salt_buf[0],
salt_bufs[SALT_POS].salt_buf[1], salt_bufs[SALT_POS].salt_buf[1],
salt_bufs[SALT_POS].salt_buf[2], salt_bufs[SALT_POS].salt_buf[2],
salt_bufs[SALT_POS].salt_buf[3] salt_bufs[SALT_POS].salt_buf[3]
}; };
// CT // CT

View File

@ -102,7 +102,7 @@ KERNEL_FQ void m14523_mxx (KERN_ATTR_ESALT (cryptoapi_t))
salt_bufs[SALT_POS].salt_buf[0], salt_bufs[SALT_POS].salt_buf[0],
salt_bufs[SALT_POS].salt_buf[1], salt_bufs[SALT_POS].salt_buf[1],
salt_bufs[SALT_POS].salt_buf[2], salt_bufs[SALT_POS].salt_buf[2],
salt_bufs[SALT_POS].salt_buf[3] salt_bufs[SALT_POS].salt_buf[3]
}; };
// CT // CT
@ -234,7 +234,7 @@ KERNEL_FQ void m14523_sxx (KERN_ATTR_ESALT (cryptoapi_t))
salt_bufs[SALT_POS].salt_buf[0], salt_bufs[SALT_POS].salt_buf[0],
salt_bufs[SALT_POS].salt_buf[1], salt_bufs[SALT_POS].salt_buf[1],
salt_bufs[SALT_POS].salt_buf[2], salt_bufs[SALT_POS].salt_buf[2],
salt_bufs[SALT_POS].salt_buf[3] salt_bufs[SALT_POS].salt_buf[3]
}; };
// CT // CT

View File

@ -115,7 +115,7 @@ KERNEL_FQ void m14523_mxx (KERN_ATTR_VECTOR_ESALT (cryptoapi_t))
salt_bufs[SALT_POS].salt_buf[0], salt_bufs[SALT_POS].salt_buf[0],
salt_bufs[SALT_POS].salt_buf[1], salt_bufs[SALT_POS].salt_buf[1],
salt_bufs[SALT_POS].salt_buf[2], salt_bufs[SALT_POS].salt_buf[2],
salt_bufs[SALT_POS].salt_buf[3] salt_bufs[SALT_POS].salt_buf[3]
}; };
// CT // CT
@ -260,7 +260,7 @@ KERNEL_FQ void m14523_sxx (KERN_ATTR_VECTOR_ESALT (cryptoapi_t))
salt_bufs[SALT_POS].salt_buf[0], salt_bufs[SALT_POS].salt_buf[0],
salt_bufs[SALT_POS].salt_buf[1], salt_bufs[SALT_POS].salt_buf[1],
salt_bufs[SALT_POS].salt_buf[2], salt_bufs[SALT_POS].salt_buf[2],
salt_bufs[SALT_POS].salt_buf[3] salt_bufs[SALT_POS].salt_buf[3]
}; };
// CT // CT

View File

@ -80,7 +80,7 @@ KERNEL_FQ void m14532_mxx (KERN_ATTR_RULES_ESALT (cryptoapi_t))
} }
// key // key
u32 ukey[8] = { 0 }; u32 ukey[8] = { 0 };
ukey[0] = hc_swap32_S (k0); ukey[0] = hc_swap32_S (k0);

View File

@ -125,7 +125,7 @@ KERNEL_FQ void m14553_mxx (KERN_ATTR_RULES_ESALT (cryptoapi_t))
} }
// key // key
u32 ukey[8] = { 0 }; u32 ukey[8] = { 0 };
ukey[0] = hc_swap32_S (k0); ukey[0] = hc_swap32_S (k0);

View File

@ -3,7 +3,7 @@
* License.....: MIT * License.....: MIT
*/ */
//#define NEW_SIMD_CODE //#define NEW_SIMD_CODE
#ifdef KERNEL_STATIC #ifdef KERNEL_STATIC
#include "inc_vendor.h" #include "inc_vendor.h"

View File

@ -140,7 +140,7 @@ DECLSPEC void m24300m (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_len, KER
u32x wd_t = w3[1]; u32x wd_t = w3[1];
u32x we_t = w3[2]; u32x we_t = w3[2];
u32x wf_t = pw_salt_len * 8; u32x wf_t = pw_salt_len * 8;
u32x a = SHA1M_A; u32x a = SHA1M_A;
u32x b = SHA1M_B; u32x b = SHA1M_B;
@ -717,7 +717,7 @@ DECLSPEC void m24300s (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_len, KER
u32x wd_t = w3[1]; u32x wd_t = w3[1];
u32x we_t = w3[2]; u32x we_t = w3[2];
u32x wf_t = pw_salt_len * 8; u32x wf_t = pw_salt_len * 8;
u32x a = SHA1M_A; u32x a = SHA1M_A;
u32x b = SHA1M_B; u32x b = SHA1M_B;
@ -906,7 +906,7 @@ DECLSPEC void m24300s (u32 *w0, u32 *w1, u32 *w2, u32 *w3, const u32 pw_len, KER
wc_t = hc_swap32 (t3[0]); wc_t = hc_swap32 (t3[0]);
wd_t = hc_swap32 (t3[1]); wd_t = hc_swap32 (t3[1]);
we_t = hc_swap32 (t3[2]); we_t = hc_swap32 (t3[2]);
wf_t = hc_swap32 (t3[3]); wf_t = hc_swap32 (t3[3]);
#undef K #undef K
#define K SHA1C00 #define K SHA1C00

View File

@ -45,9 +45,9 @@ DECLSPEC u32 MurmurHash (const u32 seed, const u32 *w, const int pw_len)
hash ^= hash >> R; hash ^= hash >> R;
} }
hash *= M; hash *= M;
hash ^= hash >> 10; hash ^= hash >> 10;
hash *= M; hash *= M;
hash ^= hash >> 17; hash ^= hash >> 17;
#undef M #undef M

View File

@ -44,9 +44,9 @@ DECLSPEC u32 MurmurHash (const u32 seed, const u32 *w, const int pw_len)
hash ^= hash >> R; hash ^= hash >> R;
} }
hash *= M; hash *= M;
hash ^= hash >> 10; hash ^= hash >> 10;
hash *= M; hash *= M;
hash ^= hash >> 17; hash ^= hash >> 17;
#undef M #undef M

View File

@ -64,9 +64,9 @@ DECLSPEC u32x MurmurHash_w0 (const u32 seed, const u32x w0, const u32 *w, const
} }
} }
hash *= M; hash *= M;
hash ^= hash >> 10; hash ^= hash >> 10;
hash *= M; hash *= M;
hash ^= hash >> 17; hash ^= hash >> 17;
#undef M #undef M

View File

@ -398,7 +398,7 @@ KERNEL_FQ void m25900_comp(KERN_ATTR_TMPS_ESALT(pbkdf2_sha256_tmp_t, blocks_t))
aes128_encrypt_cbc (aes_ks, aes_cbc_iv, b1, yn, s_te0, s_te1, s_te2, s_te3, s_te4); aes128_encrypt_cbc (aes_ks, aes_cbc_iv, b1, yn, s_te0, s_te1, s_te2, s_te3, s_te4);
aes128_encrypt_cbc (aes_ks, aes_cbc_iv, b2, yn, s_te0, s_te1, s_te2, s_te3, s_te4); aes128_encrypt_cbc (aes_ks, aes_cbc_iv, b2, yn, s_te0, s_te1, s_te2, s_te3, s_te4);
aes128_encrypt_cbc (aes_ks, aes_cbc_iv, b3, yn, s_te0, s_te1, s_te2, s_te3, s_te4); aes128_encrypt_cbc (aes_ks, aes_cbc_iv, b3, yn, s_te0, s_te1, s_te2, s_te3, s_te4);
u32 nonce[4]; u32 nonce[4];
nonce[0] = 0; nonce[0] = 0;

View File

@ -1,7 +1,7 @@
/** /**
* Author......: See docs/credits.txt * Author......: See docs/credits.txt
* License.....: MIT * License.....: MIT
*/ */
#include "common.h" #include "common.h"
#include "types.h" #include "types.h"
@ -73,7 +73,7 @@ int module_hash_decode (MAYBE_UNUSED const hashconfig_t *hashconfig, MAYBE_UNUSE
if (rc_tokenizer != PARSER_OK) return (rc_tokenizer); if (rc_tokenizer != PARSER_OK) return (rc_tokenizer);
const u8 *hash_pos = token.buf[0]; const u8 *hash_pos = token.buf[0];
digest[0] = hex_to_u32 (hash_pos + 0); digest[0] = hex_to_u32 (hash_pos + 0);
digest[1] = hex_to_u32 (hash_pos + 8); digest[1] = hex_to_u32 (hash_pos + 8);

View File

@ -39,7 +39,7 @@ sub module_verify_hash
my $signature = substr ($hash, 0, 9); my $signature = substr ($hash, 0, 9);
my $plain_base64 = substr ($hash, 9); my $plain_base64 = substr ($hash, 9);
return unless ($signature eq "{SSHA256}"); return unless ($signature eq "{SSHA256}");
return unless defined $plain_base64; return unless defined $plain_base64;
# base64 decode to extract salt # base64 decode to extract salt

View File

@ -45,7 +45,7 @@ sub module_generate_hash
"guid" : "00000000-0000-0000-0000-000000000000", "guid" : "00000000-0000-0000-0000-000000000000",
"sharedKey" : "00000000-0000-0000-0000-000000000000", "sharedKey" : "00000000-0000-0000-0000-000000000000",
"options" : {"pbkdf2_iterations":$iterations,"fee_policy":0,"html5_notifications":false,"logout_time":600000,"tx_display":0,"always_keep_local_backup":false}|; "options" : {"pbkdf2_iterations":$iterations,"fee_policy":0,"html5_notifications":false,"logout_time":600000,"tx_display":0,"always_keep_local_backup":false}|;
unless (defined $encrypted) unless (defined $encrypted)
{ {
$encrypted = unpack ("H*", $cipher->encrypt ($data)); $encrypted = unpack ("H*", $cipher->encrypt ($data));

View File

@ -58,7 +58,7 @@ sub module_generate_hash
); );
my $b_seed = $pbkdf2->PBKDF2 ($mysalt, $word); my $b_seed = $pbkdf2->PBKDF2 ($mysalt, $word);
# we can precompute this # we can precompute this
my $b_kerberos_nfolded = hex2byte ('6b65726265726f737b9b5b2b93132b93'); my $b_kerberos_nfolded = hex2byte ('6b65726265726f737b9b5b2b93132b93');
@ -68,14 +68,14 @@ sub module_generate_hash
# and 'ke' (AES key to decrypt/encrypt the ticket) # and 'ke' (AES key to decrypt/encrypt the ticket)
my $cbc = Crypt::Mode::CBC->new ('AES', 0); my $cbc = Crypt::Mode::CBC->new ('AES', 0);
my $b_key_bytes = $cbc->encrypt ($b_kerberos_nfolded, $b_seed, $b_iv); my $b_key_bytes = $cbc->encrypt ($b_kerberos_nfolded, $b_seed, $b_iv);
# precomputed stuff # precomputed stuff
# nfold 0x0000000155 to 16 bytes # nfold 0x0000000155 to 16 bytes
my $b_nfolded1 = hex2byte ('5b582c160a5aa80556ab55aad5402ab5'); my $b_nfolded1 = hex2byte ('5b582c160a5aa80556ab55aad5402ab5');
# nfold 0x00000001aa to 16 bytes # nfold 0x00000001aa to 16 bytes
my $b_nfolded2 = hex2byte ('ae2c160b04ad5006ab55aad56a80355a'); my $b_nfolded2 = hex2byte ('ae2c160b04ad5006ab55aad56a80355a');
my $b_ki = $cbc->encrypt ($b_nfolded1, $b_key_bytes, $b_iv); my $b_ki = $cbc->encrypt ($b_nfolded1, $b_key_bytes, $b_iv);
@ -98,36 +98,36 @@ sub module_generate_hash
# Pad the last block with last bytes from the decrypted n-1 # Pad the last block with last bytes from the decrypted n-1
my $b_padded_enc_ticket = hex2byte ($enc_timestamp) . (substr $b_n_1_decrypted, -(16 - $len_last_block / 2)); my $b_padded_enc_ticket = hex2byte ($enc_timestamp) . (substr $b_n_1_decrypted, -(16 - $len_last_block / 2));
# Swap the last two blocks # Swap the last two blocks
my $b_cbc_enc_ticket = (substr $b_padded_enc_ticket, 0, -32) . (substr $b_padded_enc_ticket, -16, 16). my $b_cbc_enc_ticket = (substr $b_padded_enc_ticket, 0, -32) . (substr $b_padded_enc_ticket, -16, 16).
(substr $b_padded_enc_ticket, -32, 16); (substr $b_padded_enc_ticket, -32, 16);
# Decrypt and truncate # Decrypt and truncate
my $b_dec_ticket_padded = $cbc->decrypt ($b_cbc_enc_ticket, $b_ke, $b_iv); my $b_dec_ticket_padded = $cbc->decrypt ($b_cbc_enc_ticket, $b_ke, $b_iv);
my $b_cleartext_ticket = substr $b_dec_ticket_padded, 0, length ($enc_timestamp) / 2; my $b_cleartext_ticket = substr $b_dec_ticket_padded, 0, length ($enc_timestamp) / 2;
$cleartext_ticket = byte2hex ($b_cleartext_ticket); $cleartext_ticket = byte2hex ($b_cleartext_ticket);
my $check_correct = ((substr ($b_cleartext_ticket, 22, 2) eq "20") && my $check_correct = ((substr ($b_cleartext_ticket, 22, 2) eq "20") &&
(substr ($b_cleartext_ticket, 36, 1) eq "Z")); (substr ($b_cleartext_ticket, 36, 1) eq "Z"));
if ($check_correct == 1 && defined $checksum) if ($check_correct == 1 && defined $checksum)
{ {
my $b_checksum = hmac_sha1 (hex2byte ($cleartext_ticket), $b_ki); my $b_checksum = hmac_sha1 (hex2byte ($cleartext_ticket), $b_ki);
$check_correct = ($checksum eq byte2hex (substr $b_checksum, 0, 12)); $check_correct = ($checksum eq byte2hex (substr $b_checksum, 0, 12));
} }
} }
if ($check_correct != 1) if ($check_correct != 1)
{ {
# fake/wrong ticket (otherwise if we just decrypt/encrypt we end # fake/wrong ticket (otherwise if we just decrypt/encrypt we end
#up with false positives all the time) #up with false positives all the time)
$cleartext_ticket = '68c8459f3f10c851b8827118bb459c6e301aa011180f323031'. $cleartext_ticket = '68c8459f3f10c851b8827118bb459c6e301aa011180f323031'.
'32313131363134323835355aa10502030c28a2'; '32313131363134323835355aa10502030c28a2';
# we have what is required to compute checksum # we have what is required to compute checksum
$checksum = hmac_sha1 (hex2byte ($cleartext_ticket), $b_ki); $checksum = hmac_sha1 (hex2byte ($cleartext_ticket), $b_ki);
@ -191,7 +191,7 @@ sub module_verify_hash
return unless ($algorithm eq "17"); return unless ($algorithm eq "17");
return unless (length ($edata) >= 88); return unless (length ($edata) >= 88);
return unless (length ($edata) <= 112); return unless (length ($edata) <= 112);
my $checksum = substr $edata, -24; my $checksum = substr $edata, -24;
my $enc_timestamp = substr $edata, 0, -24; my $enc_timestamp = substr $edata, 0, -24;

View File

@ -58,7 +58,7 @@ sub module_generate_hash
); );
my $b_seed = $pbkdf2->PBKDF2 ($mysalt, $word); my $b_seed = $pbkdf2->PBKDF2 ($mysalt, $word);
# we can precompute this # we can precompute this
my $b_kerberos_nfolded = hex2byte ('6b65726265726f737b9b5b2b93132b93'); my $b_kerberos_nfolded = hex2byte ('6b65726265726f737b9b5b2b93132b93');
@ -70,14 +70,14 @@ sub module_generate_hash
my $b_key_bytes = $cbc->encrypt ($b_kerberos_nfolded, $b_seed, $b_iv); my $b_key_bytes = $cbc->encrypt ($b_kerberos_nfolded, $b_seed, $b_iv);
$b_key_bytes = $b_key_bytes . $cbc->encrypt ($b_key_bytes, $b_seed, $b_iv); $b_key_bytes = $b_key_bytes . $cbc->encrypt ($b_key_bytes, $b_seed, $b_iv);
# precomputed stuff # precomputed stuff
# nfold 0x0000000155 to 16 bytes # nfold 0x0000000155 to 16 bytes
my $b_nfolded1 = hex2byte ('5b582c160a5aa80556ab55aad5402ab5'); my $b_nfolded1 = hex2byte ('5b582c160a5aa80556ab55aad5402ab5');
# nfold 0x00000001aa to 16 bytes # nfold 0x00000001aa to 16 bytes
my $b_nfolded2 = hex2byte ('ae2c160b04ad5006ab55aad56a80355a'); my $b_nfolded2 = hex2byte ('ae2c160b04ad5006ab55aad56a80355a');
my $b_ki = $cbc->encrypt ($b_nfolded1, $b_key_bytes, $b_iv); my $b_ki = $cbc->encrypt ($b_nfolded1, $b_key_bytes, $b_iv);
$b_ki = $b_ki . $cbc->encrypt ($b_ki, $b_key_bytes, $b_iv); $b_ki = $b_ki . $cbc->encrypt ($b_ki, $b_key_bytes, $b_iv);
@ -85,10 +85,10 @@ sub module_generate_hash
my $b_ke = $cbc->encrypt ($b_nfolded2, $b_key_bytes, $b_iv); my $b_ke = $cbc->encrypt ($b_nfolded2, $b_key_bytes, $b_iv);
$b_ke = $b_ke . $cbc->encrypt ($b_ke, $b_key_bytes, $b_iv); $b_ke = $b_ke . $cbc->encrypt ($b_ke, $b_key_bytes, $b_iv);
my $cleartext_ticket = ''; my $cleartext_ticket = '';
my $check_correct = 0; my $check_correct = 0;
if (defined $enc_timestamp) if (defined $enc_timestamp)
{ {
# Do CTS Decryption https://en.wikipedia.org/wiki/Ciphertext_stealing # Do CTS Decryption https://en.wikipedia.org/wiki/Ciphertext_stealing
@ -103,42 +103,42 @@ sub module_generate_hash
# Pad the last block with last bytes from the decrypted n-1 # Pad the last block with last bytes from the decrypted n-1
my $b_padded_enc_ticket = hex2byte ($enc_timestamp) . (substr $b_n_1_decrypted, -(16 - $len_last_block / 2)); my $b_padded_enc_ticket = hex2byte ($enc_timestamp) . (substr $b_n_1_decrypted, -(16 - $len_last_block / 2));
# Swap the last two blocks # Swap the last two blocks
my $b_cbc_enc_ticket = (substr $b_padded_enc_ticket, 0, -32) . (substr $b_padded_enc_ticket, -16, 16). my $b_cbc_enc_ticket = (substr $b_padded_enc_ticket, 0, -32) . (substr $b_padded_enc_ticket, -16, 16).
(substr $b_padded_enc_ticket, -32, 16); (substr $b_padded_enc_ticket, -32, 16);
# Decrypt and truncate # Decrypt and truncate
my $b_dec_ticket_padded = $cbc->decrypt ($b_cbc_enc_ticket, $b_ke, $b_iv); my $b_dec_ticket_padded = $cbc->decrypt ($b_cbc_enc_ticket, $b_ke, $b_iv);
my $b_cleartext_ticket = substr $b_dec_ticket_padded, 0, length ($enc_timestamp) / 2; my $b_cleartext_ticket = substr $b_dec_ticket_padded, 0, length ($enc_timestamp) / 2;
$cleartext_ticket = byte2hex ($b_cleartext_ticket); $cleartext_ticket = byte2hex ($b_cleartext_ticket);
my $check_correct = ((substr ($b_cleartext_ticket, 22, 2) eq "20") && my $check_correct = ((substr ($b_cleartext_ticket, 22, 2) eq "20") &&
(substr ($b_cleartext_ticket, 36, 1) eq "Z")); (substr ($b_cleartext_ticket, 36, 1) eq "Z"));
if ($check_correct == 1 && defined $checksum) if ($check_correct == 1 && defined $checksum)
{ {
my $b_checksum = hmac_sha1 (hex2byte ($cleartext_ticket), $b_ki); my $b_checksum = hmac_sha1 (hex2byte ($cleartext_ticket), $b_ki);
$check_correct = ($checksum eq byte2hex (substr $b_checksum, 0, 12)); $check_correct = ($checksum eq byte2hex (substr $b_checksum, 0, 12));
} }
} }
if ($check_correct != 1) if ($check_correct != 1)
{ {
# fake/wrong ticket (otherwise if we just decrypt/encrypt we end # fake/wrong ticket (otherwise if we just decrypt/encrypt we end
#up with false positives all the time) #up with false positives all the time)
$cleartext_ticket = '68c8459f3f10c851b8827118bb459c6e301aa011180f323031'. $cleartext_ticket = '68c8459f3f10c851b8827118bb459c6e301aa011180f323031'.
'32313131363134323835355aa10502030c28a2'; '32313131363134323835355aa10502030c28a2';
# we have what is required to compute checksum # we have what is required to compute checksum
$checksum = hmac_sha1 (hex2byte ($cleartext_ticket), $b_ki); $checksum = hmac_sha1 (hex2byte ($cleartext_ticket), $b_ki);
$checksum = byte2hex (substr $checksum, 0, 12); $checksum = byte2hex (substr $checksum, 0, 12);
} }
# CTS Encrypt our new block # CTS Encrypt our new block
my $len_cleartext_last_block = length ($cleartext_ticket) % 32; my $len_cleartext_last_block = length ($cleartext_ticket) % 32;
my $cleartext_last_block = substr $cleartext_ticket, -$len_cleartext_last_block; my $cleartext_last_block = substr $cleartext_ticket, -$len_cleartext_last_block;
@ -195,7 +195,7 @@ sub module_verify_hash
return unless ($algorithm eq "18"); return unless ($algorithm eq "18");
return unless (length ($edata) >= 88); return unless (length ($edata) >= 88);
return unless (length ($edata) <= 112); return unless (length ($edata) <= 112);
my $checksum = substr $edata, -24; my $checksum = substr $edata, -24;
my $enc_timestamp = substr $edata, 0, -24; my $enc_timestamp = substr $edata, 0, -24;

View File

@ -32,15 +32,15 @@ sub module_generate_hash
my $hash_buf = encode_base64 ($pbkdf2->PBKDF2 ($salt, $word), ''); my $hash_buf = encode_base64 ($pbkdf2->PBKDF2 ($salt, $word), '');
my $salt_buf = encode_base64 ($salt, ''); my $salt_buf = encode_base64 ($salt, '');
# replace + with . # replace + with .
$hash_buf =~ s/\+/\./g; $hash_buf =~ s/\+/\./g;
$salt_buf =~ s/\+/\./g; $salt_buf =~ s/\+/\./g;
# remove padding = # remove padding =
$hash_buf =~ s/\=+$//; $hash_buf =~ s/\=+$//;
$salt_buf =~ s/\=+$//; $salt_buf =~ s/\=+$//;
my $hash = sprintf ("\$pbkdf2-sha512\$%i\$%s\$%s", $iter, $salt_buf, $hash_buf); my $hash = sprintf ("\$pbkdf2-sha512\$%i\$%s\$%s", $iter, $salt_buf, $hash_buf);
return $hash; return $hash;

View File

@ -32,15 +32,15 @@ sub module_generate_hash
my $hash_buf = encode_base64 ($pbkdf2->PBKDF2 ($salt, $word), ''); my $hash_buf = encode_base64 ($pbkdf2->PBKDF2 ($salt, $word), '');
my $salt_buf = encode_base64 ($salt, ''); my $salt_buf = encode_base64 ($salt, '');
# replace + with . # replace + with .
$hash_buf =~ s/\+/\./g; $hash_buf =~ s/\+/\./g;
$salt_buf =~ s/\+/\./g; $salt_buf =~ s/\+/\./g;
# remove padding = # remove padding =
$hash_buf =~ s/\=+$//; $hash_buf =~ s/\=+$//;
$salt_buf =~ s/\=+$//; $salt_buf =~ s/\=+$//;
my $hash = sprintf ("\$pbkdf2-sha256\$%i\$%s\$%s", $iter, $salt_buf, $hash_buf); my $hash = sprintf ("\$pbkdf2-sha256\$%i\$%s\$%s", $iter, $salt_buf, $hash_buf);
return $hash; return $hash;

View File

@ -32,15 +32,15 @@ sub module_generate_hash
my $hash_buf = encode_base64 ($pbkdf2->PBKDF2 ($salt, $word), ''); my $hash_buf = encode_base64 ($pbkdf2->PBKDF2 ($salt, $word), '');
my $salt_buf = encode_base64 ($salt, ''); my $salt_buf = encode_base64 ($salt, '');
# replace + with . # replace + with .
$hash_buf =~ s/\+/\./g; $hash_buf =~ s/\+/\./g;
$salt_buf =~ s/\+/\./g; $salt_buf =~ s/\+/\./g;
# remove padding = # remove padding =
$hash_buf =~ s/\=+$//; $hash_buf =~ s/\=+$//;
$salt_buf =~ s/\=+$//; $salt_buf =~ s/\=+$//;
my $hash = sprintf ("\$pbkdf2\$%i\$%s\$%s", $iter, $salt_buf, $hash_buf); my $hash = sprintf ("\$pbkdf2\$%i\$%s\$%s", $iter, $salt_buf, $hash_buf);
return $hash; return $hash;

View File

@ -45,7 +45,7 @@ sub module_verify_hash
return unless defined $iter; return unless defined $iter;
return unless defined $salt; return unless defined $salt;
return unless defined $word; return unless defined $word;
my $new_hash = module_generate_hash ($word, $salt, $iter); my $new_hash = module_generate_hash ($word, $salt, $iter);
return ($new_hash, $word); return ($new_hash, $word);

View File

@ -110,7 +110,7 @@ sub pdf_compute_encryption_key_owner
} }
else else
{ {
$o_key = substr($o_digest, 0, 16); #length is always 128 bits or 16 bytes $o_key = substr($o_digest, 0, 16); #length is always 128 bits or 16 bytes
} }
#printf("\$o_key = %s\n", unpack ("H*", $o_key)); #printf("\$o_key = %s\n", unpack ("H*", $o_key));

View File

@ -12,7 +12,7 @@ use Crypt::PBKDF2;
use Crypt::Mode::CBC; use Crypt::Mode::CBC;
use Crypt::Mode::ECB; use Crypt::Mode::ECB;
# Details of the protocol design can be found in ISO 22510:2019 and # Details of the protocol design can be found in ISO 22510:2019 and
# application notes published by the KNX Association. # application notes published by the KNX Association.
# ETS 5 allows a maximum of 20 characters in a password. # ETS 5 allows a maximum of 20 characters in a password.
@ -22,17 +22,17 @@ sub module_constraints { [[0, 20], [2, 2], [-1, -1], [-1, -1], [-1, -1]] }
sub device_authentication_code sub device_authentication_code
{ {
my $password = shift; my $password = shift;
my $pbkdf2 = Crypt::PBKDF2->new my $pbkdf2 = Crypt::PBKDF2->new
( (
hasher => Crypt::PBKDF2->hasher_from_algorithm ("HMACSHA2", 256), hasher => Crypt::PBKDF2->hasher_from_algorithm ("HMACSHA2", 256),
iterations => 65536, iterations => 65536,
output_len => 16 output_len => 16
); );
my $device_authentication_code = $pbkdf2->PBKDF2 ("device-authentication-code.1.secure.ip.knx.org", my $device_authentication_code = $pbkdf2->PBKDF2 ("device-authentication-code.1.secure.ip.knx.org",
$password); $password);
return $device_authentication_code; return $device_authentication_code;
} }
@ -45,7 +45,7 @@ sub block_formatting
my $blocks_unpadded = $associated_data_length . $associated_data; my $blocks_unpadded = $associated_data_length . $associated_data;
my $pad_len = int ((length ($blocks_unpadded) + 16 - 1) / 16) * 16; my $pad_len = int ((length ($blocks_unpadded) + 16 - 1) / 16) * 16;
my $blocks_padded = $blocks_unpadded . "\0" x ($pad_len - length ($blocks_unpadded)); my $blocks_padded = $blocks_unpadded . "\0" x ($pad_len - length ($blocks_unpadded));
return $b0 . $blocks_padded; return $b0 . $blocks_padded;
} }
@ -56,14 +56,14 @@ sub encrypt
my $nonce = shift; my $nonce = shift;
my $key = shift; my $key = shift;
my $iv = "\0" x 16; my $iv = "\0" x 16;
my $aes_cbc = Crypt::Mode::CBC->new ("AES", 0); my $aes_cbc = Crypt::Mode::CBC->new ("AES", 0);
my $ciphertext = $aes_cbc->encrypt ($blocks, $key, $iv); my $ciphertext = $aes_cbc->encrypt ($blocks, $key, $iv);
my $y_n = substr ($ciphertext, length ($ciphertext) - 16, 16); my $y_n = substr ($ciphertext, length ($ciphertext) - 16, 16);
my $aes_ecb = Crypt::Mode::ECB->new ("AES", 0); my $aes_ecb = Crypt::Mode::ECB->new ("AES", 0);
my $s_0 = $aes_ecb->encrypt ($nonce, $key); my $s_0 = $aes_ecb->encrypt ($nonce, $key);
return $y_n ^ $s_0; return $y_n ^ $s_0;
} }
@ -72,72 +72,72 @@ sub generate_session_response_mac
my $secure_session_identifier = shift; my $secure_session_identifier = shift;
my $public_value_xor = shift; my $public_value_xor = shift;
my $key = shift; my $key = shift;
# Constants used for the cryptography in Session_Response frames # Constants used for the cryptography in Session_Response frames
my $knx_ip_header = pack ("H*", "061009520038"); my $knx_ip_header = pack ("H*", "061009520038");
my $b0 = pack ("H*", "00000000000000000000000000000000"); my $b0 = pack ("H*", "00000000000000000000000000000000");
my $nonce = pack ("H*", "0000000000000000000000000000ff00"); my $nonce = pack ("H*", "0000000000000000000000000000ff00");
my $associated_data = $knx_ip_header . $secure_session_identifier . $public_value_xor; my $associated_data = $knx_ip_header . $secure_session_identifier . $public_value_xor;
my $blocks = block_formatting ($b0, $associated_data); my $blocks = block_formatting ($b0, $associated_data);
return encrypt ($blocks, $nonce, $key); return encrypt ($blocks, $nonce, $key);
} }
sub module_generate_hash sub module_generate_hash
{ {
my $word = shift; my $word = shift;
# Parameters that would be found in the Session_Request and Session_Response frames # Parameters that would be found in the Session_Request and Session_Response frames
my $secure_session_identifier = shift; my $secure_session_identifier = shift;
my $public_value_xor = shift // random_bytes (32); my $public_value_xor = shift // random_bytes (32);
my $device_authentication_code = device_authentication_code ($word); my $device_authentication_code = device_authentication_code ($word);
my $mac = generate_session_response_mac ($secure_session_identifier, my $mac = generate_session_response_mac ($secure_session_identifier,
$public_value_xor, $public_value_xor,
$device_authentication_code); $device_authentication_code);
my $hash = sprintf ("\$knx-ip-secure-device-authentication-code\$*%s*%s*%s", my $hash = sprintf ("\$knx-ip-secure-device-authentication-code\$*%s*%s*%s",
unpack ("H*", $secure_session_identifier), unpack ("H*", $secure_session_identifier),
unpack ("H*", $public_value_xor), unpack ("H*", $public_value_xor),
unpack ("H*", $mac)); unpack ("H*", $mac));
return $hash; return $hash;
} }
sub module_verify_hash sub module_verify_hash
{ {
my $line = shift; my $line = shift;
my ($hash, $word) = split (':', $line); my ($hash, $word) = split (':', $line);
return unless defined $hash; return unless defined $hash;
return unless defined $word; return unless defined $word;
my @data = split ('\*', $hash); my @data = split ('\*', $hash);
return unless scalar (@data) == 4; return unless scalar (@data) == 4;
my $signature = shift @data; my $signature = shift @data;
return unless ($signature eq "\$knx-ip-secure-device-authentication-code\$"); return unless ($signature eq "\$knx-ip-secure-device-authentication-code\$");
my $secure_session_identifier = pack ("H*", shift @data); # 2 Bytes expected (using the "salt" for this purpose) my $secure_session_identifier = pack ("H*", shift @data); # 2 Bytes expected (using the "salt" for this purpose)
my $public_value_xor = pack ("H*", shift @data); # 32 Bytes expected (xor of client's and server's public value) my $public_value_xor = pack ("H*", shift @data); # 32 Bytes expected (xor of client's and server's public value)
my $mac = pack ("H*", shift @data); # 16 Bytes expected my $mac = pack ("H*", shift @data); # 16 Bytes expected
return unless (length ($secure_session_identifier) == 2); return unless (length ($secure_session_identifier) == 2);
return unless (length ($public_value_xor) == 32); return unless (length ($public_value_xor) == 32);
return unless (length ($mac) == 16); return unless (length ($mac) == 16);
my $word_packed = pack_if_HEX_notation ($word); my $word_packed = pack_if_HEX_notation ($word);
my $new_hash = module_generate_hash ($word_packed, my $new_hash = module_generate_hash ($word_packed,
$secure_session_identifier, $secure_session_identifier,
$public_value_xor); $public_value_xor);
return ($new_hash, $word); return ($new_hash, $word);
} }